A new framework for analyzing color models with generative adversarial networks for improved steganography

被引:5
作者
Sultan, Bisma [1 ]
ArifWani, M. [2 ]
机构
[1] Univ Kashmir, Postgrad Dept Comp Sci, Hazaratal, Srinagar 190006, India
[2] Univ Kashmir, Postgrad Dept Comp Sci, Hazaratbal, Srinagar 190006, India
关键词
Steganography; GAN-based steganography; Color models in steganography; Deep learning in steganography; STEGANALYSIS;
D O I
10.1007/s11042-023-14348-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography algorithms are designed by human experts and use rule-based methods to hide the secret data inside a cover medium. Recently, this process has been automated by using Generative Adversarial Networks. However, Generative Adversarial Networks based steganography has certain limitations. These algorithms may not generate steganographic images that are real enough to fool the intruder. Security of steganography degrades as embedding capacity is increased. A new framework for improved steganography based on deep learning is proposed in this paper. The new framework uses color models with Generative Adversarial Networks. Popular color models such as HSV, YCrCb, YDbDr, CIE-XYZ, YIQ, HED, and YUV are analyzed. The proposed framework helps to identify the best color model with Generative Adversarial Networks based steganography. The quality of steganographic images is assessed with three metrics: capacity, security, and invisibility. Extensive experimentation has been carried out with the CelebA dataset which has more than 200 K samples to assess the effectiveness of the proposed framework. The results show that compared with the RGB and other color models, the CIE-XYZ model produces the best results with Generative Adversarial Networks for steganography.The results further show that the proposed framework improves the security of steganography even when the embedding capacity is increased.
引用
收藏
页码:19577 / 19590
页数:14
相关论文
共 39 条
[1]  
Bachrach M, 2013, MULTIMEDIA SECURITY: WATERMARKING, STEGANOGRAPHY, AND FORENSICS, P201
[2]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[3]  
Goodfellow I., 2015, P 3 INT C LEARNING R, P1
[4]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[5]   A New Optimization Strategy for Solving the Fall-Off Boundary Value Problem in Pixel-Value Differencing Steganography [J].
Grajeda-Marin, Ismael R. ;
Montes-Venegas, Hector A. ;
Raymundo Marcial-Romero, J. ;
Hernandez-Servin, J. A. ;
Munoz-Jimenez, Vianney ;
De Ita Luna, Guillermo .
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2018, 32 (01)
[6]  
Hayes J, 2017, ADV NEUR IN, V30
[7]   Universal distortion function for steganography in an arbitrary domain [J].
Holub, Vojtech ;
Fridrich, Jessica ;
Denemark, Tomas .
EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)
[8]  
Holub V, 2012, IEEE INT WORKS INFOR, P234, DOI 10.1109/WIFS.2012.6412655
[9]   A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks [J].
Hu, Donghui ;
Wang, Liang ;
Jiang, Wenjie ;
Zheng, Shuli ;
Li, Bin .
IEEE ACCESS, 2018, 6 :38303-38314
[10]   Video splicing detection and localization based on multi-level deep feature fusion and reinforcement learning [J].
Jin, Xiao ;
He, Zhen ;
Xu, Jing ;
Wang, Yongwei ;
Su, Yuting .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (28) :40993-41011